New Research Shows Why We Should Trust CSPs With Our Data Security New research, published this week, shows that the most effective way of protecting consumers from online security threats is to apply network-based security solutions, because CSPs are best placed to deliver security to the mass market. Furthermore, CSPs can gain significant revenue…

Don’t let cybercriminals score. Beat their game-plan. Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The numbers are staggering. FIFA estimated that 715.1…

Danger: VPNFilter Malware: What is it and how is network-based security best placed to thwart it? What’s this latest threat? A new malware threat has emerged that poses such a serious potential threat to data security that the FBI has advised all router users to reboot their devices. The malware, called VPNFilter, can spy…

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

From connected vehicles and vending machines to smart meters and wearables. The Internet of (connected) things (IoT) is promising to change our daily life as we know it, making it easier, better and more efficient. The recent massive Distributed Denial of Service (DDoS) attack, however, disrupted some of the most popular Internet services like Twitter and AirBnB. Carried out using an army of IoT botnets, the attack raised alarm bells with service providers. It proved that besides the smart and cool experiences IoT devices can deliver, there is a big security risk that cannot be overlooked.

Many organizations, including financial institutions, gaming companies, telecom networks and other enterprises, experience DDoS attacks even though they are equipped with a Firewall and IPS. Ironically, during a DDoS attack these security functions are likely to become the weakest link of the entire network security.

In the 21st century, cybercrime is rampant with hackers stealing and using data from individuals, companies and governments for their personal, financial or political gain. In particular, government agencies and large corporations are prime targets for organized hacker groups (“hacktivists”) such as Anonymous.

Keeping you up to date

Be the first to know about the latest updates and trends in network security and IoT.